Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
All. I don't see where hashcat can help me to do these steps, so I guess I need to code in python or C++ to deal with RC4 decryption and encryptedVerifier?
If yes, are you aware of an existing code t... |
|
Mem5 |
hashcat
|
13 |
10,132 |
01-20-2018, 12:34 PM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
atom Wrote: (01-24-2018, 11:02 AM)
--
Just use -m 9700 then and crack as normal
--
Do you mean bruteforce or wordlist attack ? But if the password is more than 30 characters I won't be able to re... |
|
Mem5 |
hashcat
|
13 |
10,132 |
01-25-2018, 10:58 PM |
|
|
Thread: WPA and first hash
Post: WPA and first hash
Hi,
Cracking a WPA hanshakes gives:
Code:
--
7895f1b96f8d927f11c5b7e998740207:bssid:stamac:essid:password
--
Is it possible - and if yes how - to calculate the first hash "78.." from the hccapx f... |
|
Mem5 |
hashcat
|
2 |
2,750 |
02-20-2018, 05:56 PM |
|
|
Thread: hashcat v4.1.0
Post: RE: hashcat v4.1.0
Awesome as usual, thanks! |
|
Mem5 |
hashcat
|
13 |
32,462 |
02-22-2018, 12:02 AM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Thanks atom.
I use this cmdline: hashcat64 -m 9800 -a 3 -w 4 -O office.hash ?a?a?a?a?a?a?a?a?a
After 30 hours (on 2x1080), nothing cracked so far.
Wha do you mean by "pretty soon" ? :D |
|
Mem5 |
hashcat
|
13 |
10,132 |
02-25-2018, 11:32 AM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Same behaviour with 9700 by the way. I've tried both. |
|
Mem5 |
hashcat
|
13 |
10,132 |
02-25-2018, 02:52 PM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Hum, I'm confused as philsmd wrote:
philsmd Wrote: (09-12-2017, 05:00 PM)
--
If you read this carefully https://hashcat.net/forum/thread-3665.html, you will see that you only need -m 9710 to acces... |
|
Mem5 |
hashcat
|
13 |
10,132 |
01-23-2018, 11:59 AM |
|
|
Thread: WPA and first hash
Post: RE: WPA and first hash
|
Mem5 |
hashcat
|
2 |
2,750 |
02-27-2018, 05:10 PM |
|
|
Thread: brut password for etherwallet, I forgot it!
Post: RE: brut password for etherwallet, I forgot it!
The guys at onlinehashcrack.com have a ethereum hash extractor, if you are lazy to install python on your own.
They *may* be able to crack it as well, I did not try them yet.
Of course don't give them... |
|
Mem5 |
hashcat
|
9 |
7,903 |
03-06-2018, 07:30 PM |
|
|
Thread: Hello everyone!
Post: RE: Hello everyone!
It's not an error of GUI but hashcat itself here.
@dilau1 : Please paste here the output of "hashcat -I" |
|
Mem5 |
hashcat
|
3 |
3,386 |
03-09-2018, 10:10 AM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: Mix of --hex-charset and non hex ?
Hi,
I would like to crack this kind of password :
Code:
--
user\trandom
--
"user" is constant
"\t" : tab : 0x09
"random" : password I want to guess, i.e. in my wordlists
I tried :
Quote:... |
|
Mem5 |
hashcat
|
7 |
5,471 |
03-18-2018, 02:06 PM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
Thanks for your answer. I converted ascii in to hex.
Do you mean I will have more success with a combinator attack instead ? |
|
Mem5 |
hashcat
|
7 |
5,471 |
03-18-2018, 04:58 PM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
Yes.
So i need to put 'user\n' in a file and combine it with another wordlist? |
|
Mem5 |
hashcat
|
7 |
5,471 |
03-18-2018, 06:11 PM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
It works well, thanks.
I would add to your good answer the use of --hex-salt for hex-salt support for the hashfile, in my case. |
|
Mem5 |
hashcat
|
7 |
5,471 |
03-20-2018, 09:04 AM |
|
|
Thread: Hash acceptance on modes 9810 an 9800
Post: Hash acceptance on modes 9810 an 9800
Trying to crack an oldoffice $4 hash, it works with mode 9800 but not with mode 9810, any idea why ?
Code:
--
hashcat64.exe -m 9810 -a 3 hashlist ?b?b?b?b?b
hashcat (v4.1.0) starting...
Hashfile 'h... |
|
Mem5 |
hashcat
|
2 |
2,539 |
04-05-2018, 09:21 PM |
|
|
Thread: Hash acceptance on modes 9810 an 9800
Post: RE: Hash acceptance on modes 9810 an 9800
Hum ok thank you.
Is there a way to access to the data without the real password ? |
|
Mem5 |
hashcat
|
2 |
2,539 |
04-05-2018, 09:47 PM |
|
|
Thread: [Copying] for a long time
Post: [Copying] for a long time
Hi,
Cmd line:
hashcat64.exe -m 120 -a 6 -w 4 -O D:\dic.txt ?a?a?a?a?a?a
Quote:
--
Status...........: Running
Hash.Type........: sha1($salt.$pass)
Hash.Target......: xxx
Time.Started.....: Mon May ... |
|
Mem5 |
hashcat
|
5 |
3,426 |
05-07-2018, 07:08 PM |
|
|
Thread: [Copying] for a long time
Post: RE: [Copying] for a long time
Any hint to do this attack differently? |
|
Mem5 |
hashcat
|
5 |
3,426 |
05-07-2018, 09:21 PM |
|
|
Thread: [Copying] for a long time
Post: RE: [Copying] for a long time
Finally the Pipe with --stdout option is the same - very slow - looking at "Util":
Quote:
--
HWMon.Dev.#1.....: Temp: 57c Fan: 0% Util: 52% Core:1860MHz Mem:4513MHz Bus:1
HWMon.Dev.#2.....: Temp: 50... |
|
Mem5 |
hashcat
|
5 |
3,426 |
05-08-2018, 06:45 PM |
|
|
Thread: Weird estimated time
Post: RE: Weird estimated time
To check if time estimate is accurate, divide the number of tries (charset) to the speed, and you'll roughly find the same time. |
|
Mem5 |
hashcat
|
5 |
3,467 |
06-05-2018, 09:17 AM |